The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the
reader collision problem and cannot always be solved by assigning them to different frequency ...

The demand for mobile service increase many service providers which they start finding solutions for integrating third and fourth generation networks and to develop mobility protocols. This article introduces the macromobility, ...

In this paper, we present a comparative study of three distributed strategies for task allocation in a multirobot system. The objective is to determine the course of action for each robot and the targets it needs to service. ...

In this letter, we addressed the problem of estimating
the time delay and the frequencies of noisy sinusoidal signals received
at two spatially separated sensors. We employ the Propagator
Method (PM) in conjunction with ...

An increase in the size and requirements of a mobile workforce is driving the development of better
mobility oriented services in terms of both content and connectivity. Even though traditional Mobile IP
has been the ...

As the popularity of mobile computing grows,
the associated protocols and their scalability are
subject to much closer scrutiny. Mobile IP relies
heavily on the use of IP-to-IP tunneling, requiring
20 bytes of overhead ...

Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ...

Internet connectivity which was in experimental stages
only a few years ago is a reality today. Current
implementations allow passengers to access Internet for
pleasure and in some cases secure VPN access is provided
to ...

Safety and security are the most discussed topics in the
aviation field. The latest security initiatives in the field of
aviation propose [1I] the aircraft carriers to implement
video surveillance within the aircraft ...

Recent research has indicated that transmission control protocol (TCP) in its base form does not perform well in an ad hoc
environment. The main reason identified for this behavior involves the ad hoc network dynamics. ...